Difference between revisions of "TEK5530/List of papers"
(→List of papers for TEK5530) |
Josef.Noll (Talk | contribs) (→List of papers for TEK5530) |
||
Line 48: | Line 48: | ||
:9) [http://www.sciencedirect.com/science/article/pii/S1389128616301359 Mingkui Wei, Wenye Wang, "Data-centric threats and their impacts to real-time communications in smart grid"] | :9) [http://www.sciencedirect.com/science/article/pii/S1389128616301359 Mingkui Wei, Wenye Wang, "Data-centric threats and their impacts to real-time communications in smart grid"] | ||
− | + | :10) [http://www.sciencedirect.com/science/article/pii/S0167404816300876 Langer, Lucie et al., "From old to new: Assessing cybersecurity risks for an evolving smart grid"] | |
− | + | :11) [http://ieeexplore.ieee.org/document/7565732/?reload=true Debiao He et al., "Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography"] | |
− | + | :12) [http://aircconline.com/ijnsa/V8N2/8216ijnsa06.pdf Elkhodr, Mahmoud ; Shahrestani, Seyed ; Cheung, Hon, "The Internet of Things : New Interoperability, Management and Security Challenges"] | |
:13) [https://thesai.org/Downloads/Volume7No12/Paper_54-Software_Defined_Security_Service_Provisioning.pdf Idris, Faraz, Hameed, Sufian, "Software Defined Security Service Provisioning Framework for Internet of Things"] | :13) [https://thesai.org/Downloads/Volume7No12/Paper_54-Software_Defined_Security_Service_Provisioning.pdf Idris, Faraz, Hameed, Sufian, "Software Defined Security Service Provisioning Framework for Internet of Things"] | ||
Line 58: | Line 58: | ||
:14) [http://ieeexplore.ieee.org/document/7478513/ Ali, Mazhar et al., "Security and Dependability of Cloud-Assisted Internet of Things"] | :14) [http://ieeexplore.ieee.org/document/7478513/ Ali, Mazhar et al., "Security and Dependability of Cloud-Assisted Internet of Things"] | ||
− | + | :15) [http://ieeexplore.ieee.org/document/7917622/ Anna Kornfeld Simpson et al., "Securing Vulnerable Home IoT Devices With an In-hub Security Manager] | |
:16) [http://ieeexplore.ieee.org/document/7998185/ Fari Assaderaghi et al., "Privacy and Security: Key Requirements for Sustainable IoT Growth"] | :16) [http://ieeexplore.ieee.org/document/7998185/ Fari Assaderaghi et al., "Privacy and Security: Key Requirements for Sustainable IoT Growth"] | ||
Line 64: | Line 64: | ||
:17) [http://ieeexplore.ieee.org/document/7917637/ Anna Sojka-Piotrowska, Peter Langendörfer, Shortening the security parameters in lightweight WSN applications for IoT - lessons learned] | :17) [http://ieeexplore.ieee.org/document/7917637/ Anna Sojka-Piotrowska, Peter Langendörfer, Shortening the security parameters in lightweight WSN applications for IoT - lessons learned] | ||
− | + | :18) [http://ieeexplore.ieee.org/document/8188589/ Botir Usmonov et al., "The cybersecurity in development of IoT embedded technologies"] | |
:19) [http://ieeexplore.ieee.org/document/8070757/ Vishwesh Nagamalla, Aruna Varanasi, "A review of security frameworks for Internet of Things"] | :19) [http://ieeexplore.ieee.org/document/8070757/ Vishwesh Nagamalla, Aruna Varanasi, "A review of security frameworks for Internet of Things"] |
Revision as of 09:32, 16 January 2020
Wiki for ITS | ||||||
---|---|---|---|---|---|---|
|
Evaluation criteria
Your presentation is expected to last for 25 minutes, you will be stopped at 26:00. That means you need to identify the key messages of the selected paper. There is penalty for both being too short and for being too long. You will get questions about your paper and your presentation. One block of presentation and questions will approximately take 30 min.
Your presentation will be evaluated with respect to the following criteria:
Knowledge and Overview over topics in the paper
- what is the paper about, which specific aspects are addressed?
Identification of key findings of the paper:
- why are the findings key findings, to what extend are they different from the state-of-knowledge?
- what are the strengths/weaknesses of the approaches being mentioned
Scientifically precise presentation
- Be precise in your formulations, avoid story telling.
- Use numbers where appropriate, e.g. 20% more instead of much more
Evaluation of the paper
- what is your take on the paper? Criticism, own thoughts,...
Style:
- clear structure, clear and concise slides
- Provide examples, and respect the time
The quality of your presentation will weigh 20% of your final grade.
List of papers for TEK5530
Attached is a list of papers, from whom you may select one to be presented later in the course. Alternatively, select an academic paper of your choice. We suggest to start with Google Scholar or Microsoft Academics. Read more on: Guide on how to search for Literature
- 10) Langer, Lucie et al., "From old to new: Assessing cybersecurity risks for an evolving smart grid"
- 15) Anna Kornfeld Simpson et al., "Securing Vulnerable Home IoT Devices With an In-hub Security Manager
- 20) Thales L. von Sperling et al., "Tracking intruders in IoT networks by means of DNS traffic analysis"